§ Trust

Security

Effective 1 May 2026

Infrastructure

Nephra runs on Digital Ocean App Platform with compute isolated per customer request. Our database is hosted by Supabase (PostgreSQL) in the EU (Frankfurt).

All systems are protected by a Web Application Firewall and DDoS mitigation provided by Cloudflare.

Encryption

Data at rest: AES-256-GCM for all database fields containing personal or clinical data.

Data in transit: TLS 1.2 or higher enforced on all connections. HTTP is redirected to HTTPS.

Authentication tokens: Supabase Auth issues short-lived JWTs signed with ES256. Tokens are validated server-side on every request.

Access control

Nephra uses role-based access control (RBAC) with five distinct roles: Admin, Doctor, Nurse, Operator, and Patient. Each role has a least-privilege set of permissions enforced at the API layer.

All admin access to production infrastructure requires multi-factor authentication.

Audit logging

Every write operation on clinical data is recorded in an append-only audit log with user ID, timestamp, and action type. Logs are retained for a minimum of 7 years.

Vulnerability disclosure

If you discover a security vulnerability, please report it responsibly to [email protected]. We aim to acknowledge reports within 2 business days and provide a fix timeline within 10 business days for critical issues.

We do not pursue legal action against researchers who act in good faith under this policy.

Certifications (in progress)

SOC 2 Type II audit is currently in progress. We expect to complete it in late 2026. Contact us for the latest status.